Skip to main content

Full text of "2600 Magazine"

See other formats


2600 Magazine - Volume 1, Number 3 


ZOUU March, 1984 


— — — == 

■ .i^lihlinl HniMiihl^ Iil JMHF l:\IJ.M I’HIM-S, m AthffcwMry pr£Hairali«ifi. KuhuniMk-iii 
rjiiiL hiu i FD utiaihjJlh . Writ* w Unkn T.JJ. Middk lUind. N V I F«J. 


FSLN 3 VOLUME ONE NUMBER THREE 


r 



THE CONSTITUTION OF A HA CKER 


With every generation of humane there are certain types- 
of individual* that emerge. There are (always have been and 
always wilt be) leaders, followers, general nuisances, etc. 
And then there are folks who like to play with things and 
figure out how they work. 

Before technology came along, there really wasn't all that 
much for these people to play around with. And certainly 
there was no way for them to pool their resources except 
through face-to-face communications. 

With telephones, of courts all aspects of human life 
changed. Here was a toy that anyone could play with and get 
virtually unlimited results. But of course, most people did n’t 
(and don't) see it that way— rphones are phones and nothing 
more. You're not supposed to have fun with them. Yet, 
certain adventuresome type* insisted on having fun with 
their phones anyway. Tjiey : did all kinds of things they 
weren't supposed to dg T like figure out the way phones work 
and interconnect. For the first time, these technological 
enthusiasts posed a "threat** to technology by reaching out 
and touching it rather than simply using it without asking 
any questions. 

Today there .are Jots of people still having fun with their 
phones and mi king af I kinds of technological advancements 
of their own. But the real focus at the moment is on the 
newest "threat," people who like to experiment and have fun 
with computers. Not the kind pf fun thcyYe supposed to be 
having with Pacman^and Mr. Do*, but unauthdriietf fun 
with other people's computers. 

Why do they do this? What do these people possibly have 
to gain by breaking into computer systems and seeing things 
that don’t really concern them or I hat is of no possible use to 
them? In the great majority of cases, computer hackers 
don't gain anything niatefial or financial from their 
exploration. Add lolhiit the high risk of getting caught and 
it becomes very hint for the average citizen to understand 
whpt motivates these people.. 

Many computer . hobbyists, in fact, are resentful of 
hackers, consign (bent immature and troublesome. 
Quite a fc w conDputfcr hu Ucttn boards prohibit certain topics 
from being discussed, $i)df wtipn they do, hacking is almost 
always one of them. Tigris, is some justificat ion behind this, 
since the image of ailcomputcr users can be adversely 
affected by what t|^ dp. 

There are pisii the ..tagal people who insist on telling 
everyone that jbtrica king into ^computer hy phone is just like 
physically bneatih&iiiioa home or office. Fortunately, that 
logic seems to feejsbpred by very, few people. 

In spite of dH/oCf^ greats and ciiticism, though, the 
hackers arc SOI thpif aci," And public opinion, 

particularly apjo^g t be young, seems to be in their favor, 
mostly as a rtsuti of media Coverage 

There’s, even a ivebkty TV program about hackers called 
Jhe \Vfu 2 /ffr^4J^eh%ek, this group of a mazing kids has a 
new adventure. The scripts area bit moronic but interesting 
nonetheless. In gne episode, the kids (only one of which is a 
true hacker) find out about an evil person who happens to be 
stealing Social Security checks. (They discover this by 
casually logging into his bunk account.) To leach him a 


lesson, they break into another computer and enter his name 
as being deceased- In each program, these kids break into at 
least one new computer. But do they ever get into trouble? 
Of course not. First of all, they’re only children. And second, 
they're entering these computers for good reasons, even if 
they are unauthorized. 

Now what kind of message is this program conveying? 
Apparently, it's OK to invade other people’s privacy if your 
intentions are ultimately "good." It sounds Like something 
Reagan would gel a kick out of. 

A genuine hacker breaks into computers for the 
challenge. He's not out to save the world, nor to destroy it. 
He is not out to make a profit out of what he's doing. 
Therefore, it's not fair to categorize him as a criminal and it's 
just as wrong to say he’s some sort of a savior. 

Technological enthusiasts operate with the same 
motivation that a good mountain climber has. Regardless of 
what may happen to him, a computer hacker wiilaAvfiyj be 
interested in playing with computers. It’s in his nature. And 
any laws that are created to “eliminate” hacking simply 
won't work because of these facts. There will always be 
people who want to experiment with things and this urge 
cannot be stifled. Did hacking come to a grinding hall 
because of the “414" scandal? Or because of the Tclemail 
raids? No. Judging From the proliferation or computer 
bulletin boards where hacking is discussed, it's getting 
bigger than ever. 

The realistic way for the owners of large computer 
systems to look at this is to regard backers as necessary 
security checks. That's right. Necessary because if the 
hackers weren't the ones to break in, who would be? Let’s 
assume that hackers had never even tried to break into the 
Memorial 51 can- Kettering Cancer Center computer. 
Someone else would have, because the system was 
practically wide open. And maybe they would have had a 
reason to get into the system— to do various nasty things. 
But now, because of what the hackers did, the Sloan- 
Kettering system is more secure. 

One could almost say that a person with hacking abilities 
has an obligation to try and get Into as many different 
systems as he can. Let's get nationalistic for a moment. If 
you have the number for a top-secret government computer 
in Ft, George G. Meade, MD, odds are that the Albanians 
have it also. Now, would it be better for them to break into 
the system and find out all kinds of nice things or for you to 
break in and be discovered, forcing the system to become 
more protected? And, if you do break in, don't you deserves 
note of thanks for waking them up? 

Keep in mind, though, that a computer hacker is undent 
obligation to turn himselT in or warn operators that their 
system is easily penetrable. It's the job of the sysops to notice 
when their computers are being tampered with and if they 
don't detect you, then that's a second security lapse for them. 

This is a pragmatic view, however shocking it may seem. 
In closing; wc should point out to the hackers themselves 
that there is no need to worry or fret if their methods or 
secrets are eventually d iscovered. This is only the beginning. 
Our world is turning into a technological playground. 


i 


ALTER J> A I E LOING U1S1AJNLE 

First of a persistent series — how the companies work and a guide to MCI 


SWAGIMA. That’s the word that National Public Radio 
uses to describe Long distance services. It stands for SBS (or 
Skyline}, Western Union (or Metrofone), Allnet (or 
Combined Network Services}, GTE Sprint, ITT, MCI, and 
of course AT&T, And there are many more, each of which 
will eventually be covered in our pages. Right now though, 
we’d tike to give you an idea of what these systems arc and 
how they work. 

Except for AT&T, ail of the above systems work in a fairly 
similar manner. (This will be changing very soon and very 
dramatically under the terms of the Bell divestiture) Each 
system has its own series of networks* i.e. land-lines, lines 
leased from AT&T, microwave relays* satellite Links* etc. 
They each have local city access numbers, although some 
like Aiinet and MCI have special ways of using a "travel 1 * 
service by dialing a special number* while Sprint uses a 
"travelcode” to access nodes outside the subscriber’s city. 
On others, like Metrofone, you can use the same 
authorization code from any of their access points. 

A long distance telephone company consists of four major 
parts: you have your input — that is, a local access number or 
a toll-free “£00” number to access the^ystem. When you do 
this, a device called a “switch 41 answers, giving you the 
familiar "computer dial tone” When you enter your 
authorization code and destination number you are routed 
over their network. The heart of the system is the controlling 
system, which includes the "switch” This is the computer 
that checks the authorization code, has provisions for time- 
of-day restrictions, traveicodes, accounting codes, and the 
like. They have a few provisions which the longdistance 
services donY appear to use, such as the infamous “speed 
number 11 recording which was a favorite of many phone 
phrtaks (for reasons you’ll soon know if you don’t already). 
The system checks to see if the Location being dialed is on the 
network, and acts accordingly. It makes a Log of numbers 
called, the authorization code, and time usage which is 
stored on a word processing tape and then read by another 
system for billing. Some companies charge in one minute 
increments, although the system has the capability to record 
time usage in 6 second increments. 

There are quite a few different systems in use today. A 
couple of the most common ones art made by Northern 
Telecommunications, which is based in Dallas, Texas. 
Another company that sells similar equipment is Rockwell 
We scorn, MCI allegedly is in the process of buying new 
switches from them, and they will be installed by Dynacomp 
Telecommunications, also based in Dallas. 

Microwave Links 

Mast of the low cost services, at one point oranother* use 

microwave antennas to transmit calls, Each microwave 

. «■ 

station is Located about 30 miles from each other to make up 
for the curvature of the earth since microwaves travel in a 
straight line. Each of these stations has 4 dishes (at least). 
One dish is used to receive from a previous station and one is 
used to transmit to that station. The other two dishes do the 
same thing to the destination station — one receives and one 
transmits. So if you make a call 3000 miles away* you may 
wind up going through 100 different microwave stations, 
many of which you can see next to major highways. 

This is how the alternate long distance companies manage 
to charge less than AT&T; they use their own systems. But 
this is also why, in many instances, (he sound quality is 


poorer on the alternate services. Remember, a chain of 
microwave towers is only as strong as its weakest 
connection. 

A Look at MCI 

MCI (Microwave Communications Inc.) was the first new 
kid on the block, way back in 1967 when the idea of an 
alternate phone service was almost unheard of and 
practically illegal. MCI was fust used solely by businesses 
who wanted to communicate between the cities of Chicago 
and Cleveland That was it. And even with this amazingly 
limited system* MCi ran into problems with AT&T, who 
didn't want anybody trying to do what they did. Lawsuits 
followed, with MCI e ventually getting a prombe of eventual 
equal access, to the AT&T network. In fact, MCI’s legal 
action is considered one of the motivating factors behind the 
break-up of the Bell monopoly. 

Now MCI is the biggest of the alternate services (they 
have well over a million subscriber* at present, having 
opened their doors to residential customers a mere 5 years 
ago) and also one of the hardest to penetrate. The system has 
5 digit codes that art entered before the (0 digit phone 
number, a total of 1 5 digits. But these codes only work from 
one location, making it rather unlikely to find one by 
guesswork. If you want to use the system from another city, 
you have to sign up for MCI “credit card" service which 
costs an additional S5 a month (on top of an initial IS a 
month charge for the regular service). Here you get a List of 
48 phone numbers around the country and a 7 digit code 
which can be used from any one of them,, Most code seckcre 
prefer scanning the “credit card” numbers since more 
numbers work overall. However, a strong argument can 
often be heard in favor of the 5 digit number* that are 
located in densely populated areas. like Los Angeles or New 
York. Naturally* the odds of finding something increase 
under those circumstances. 

No Proven Method For Finding Codes 

MCI, being the oldest of the companies* has learned quite 
a bit in (hat time. Therefore, no major bugs are still crawling 
around on their system. Hacker* have many theories on 
number patterns, of course. For example* numbers like 
22212 or 12345 tend not to work. In other words, your guess 
is as good as our*. As far as what they do when they know a 
code is being abused, MCI seems to be more interested in 
changing the code rather than laying a trap, as other 
companies have been known to do< Of course, this doesn’t 
mean that they're incapable of doing such a thing. 

MCE Features 

The MCI tone sounds like all the others (a hoUowish* 
medium-pitched, steady tone), but it has its own set of 
recordings, depending on what you do to it. If you enter an 
invalid code*, you’ll hear a mechanical female say; "THEE 
AUTHORIZATION CODE YOU HAVE DIALED IS 
INVALID TWO ZERO THREE" and then an ESS reorder 
that trips over itself (listen to it and you’ll understand}. If 
you dial someplace you're not supposed to call (for whatever 
reasons), you’ll hear “THEE NUMBER YOU HAVE 

dialed isnot on the network TWO ZERO 
THREE" and (he reorder. Each MCI dialup has its own 3 
digit identity code and they tend to be simitar the doser 
together they are. 

Many businesses are installing MCI “dedicated lines" in 

{continued on page 4) 



c 

I 
¥ 




718 is coming! 

I lM PiIlY,- Yfli* ItlTWI 

The New York Stale Public Service Commission has 
voted to begin dividing New Yprk City into two area codes 
on September I to "prevent an impending exhaustion of 
telephone numbers/' At that timc + the old 2 1 2 area code wilt 
begin to reach only Manhattan and the Bronx, whereas a 
brand new area code, 718, wilJ start to work for Brooklyn, 
Queens, and Staten Island. The whole system becomes 
mandatory on January 1* 1985, 

Charles Herndon, a New York Telephone spokesman, 
said that the 718 code was assigned to the city years ago by 
the North American Dialing Plan, a group that administers 
area codes in the U.S.* Mexico, and Canada. 

"Of the numbers available at the time, 718 was the best*" 
he said, "There weren't that many available ” 

The P,S.C. rejected recommendations by a consultant 
{Economics and Technology* Inc.) hired by the City Board 
of Estimates. Those recommendations called for the 
implementation of the 718 area code, however, instead of 
using it for people* the consultant suggested using it 
exclusively for computers, paging systems, and other 
devices, since they were the main reason for the new area 
code in the first place. 

[2600 would like to go on record as enthusiastically 
supporting the idea of an entire area code of machine;.] 

Supercomputer dialups 

l |, Ji)sin TwJay 

Astronomy and astrophysics are gathering so much data 
by telescope these days* that it cannot be handled by 
conventional computers* according to Dr Vincent Icke of 
the University of Minnesota. 

To remedy the problem, Dr. take called for the creation of 
a central supercomputer facility that would be at the 
disposal of all astronomers and astrophysicists nationwide 
via telephone lines. 

Wiretap City 

I he p r >v Vflrt. furo 

After an investigation, the New Haven (Connecticut) 
Board of Police Commissioners* a civilian body that 
oversees the Police Department, revealed in 1978 that the 
department had routinely tapped the phones of residents 
from 1964 to 1971, apparently to monitor radical political 
activity. This* the board said* was illegal. 

In December 1982, after it had been disclosed that the 
phones of some JOOO residents had been tapped, the Federal 
District Court in Bridgeport made the case a class action* 
inviting anyone who felt wronged to become a plaintiff. 

So Far, 1230 people have become plaintiffs, They include 
several judges, lawyers, and other prominent political 
figures and* of course, a great many members of the Yale 
faculty. 

Students Cause Havoc in Computer 

< firsts Shuikui 

A group of students at Gompers Secondary School in San 
Diego tapped into the school's computer system last month, 
causing uJ| kinds of problems. 


"It was funny at first when t he kids changed the passwords 
so the teachers couldn't g ct ' nt0 their programs in the 
system," said Alex Rascon, a school official, "But then they 
started deleting grades, altering ihe other kids" homework, 
and tampering with the teachers' Hies. 

"These kids art whizzes— ihey're very bright," he went on, 
"Fortunately we caught it before too much damage was 
done. At this point it can be easily corrected " 

Albert Cook, the assistant San Diego superintendent, 
took the sorehead approach. “We still haven't decided 
whether charges will be filed with the San Diego Police 
Department," he said. 


The Person Numbers 

Tk AmtcLiKd I'm* 

Sweden's Person Number is a 10-digit figure that tells who 
you arc, where and when you were born, and your sex. Every 
computer file in the country is based on the Person Number, 
whether it's at a bank, a hospital, an employer, the social 
welfare office, or the tax authorities. 

Person Numbers went into effect on January 1 , 1947 and 
were computerized 20 years later. Recently, a government 
study suggested the creation of a super-databank (based on 
the Person Number) that the Central Bureau of Statistics 
could use freely. By calling up a Person Number on a 
terminal, the bureau would be able to find out details on 
everything from a person's illnesses and criminal record to 

his income and debts. 

Critics of the plan see this as an erosion of civil liberties. 
One said, "The files will collect more information on a 
person than he can remember himself." 


Furthermore... 

iMhf Newt 

* All computers seized by the FBI last October during the 
Telemail raids haveeilher been returned already orare in the 
process of bemgsent back. New developments in Lhecasc are 
expected shortly, 

* Telenet now hangs up after 3 connection attempts, 
whether they're successful or not. This means that last 
month's article {Hacking on Telenet) is already slightly 
outdated* but only until somebody figures out a way around 
this latest hurdle. 

■ Some more signs of the divestiture— this time it's the 
: 956 exchange. This is a universal exchange that is {or will 
soon be) working everywhere. 950-1022 and 950-1088 give 
alternate long distance dia llones. (The latter belongs to 
Skyline.) The connection is crystal clear and toll-free, 
Eventually* the 950 will be dropped and you will dial 1 OX X 
to make long distance calls* where XX is the carrier of your 
choice. You can't access 95G's in other area codes, 

* Eastern Airlines has changed its mind about allowing 
, portable computers on Bights, leaving only American 

Airlines maintaining the ban. 

* 202 and 214 now have automated directory assistance 
too. Have you cheeked your area code today/ 





THE FIRST A TOMIC BOMB 


A TRUE TALC 

This story was originally related by Laura Fermi, widow 
of the nuclear physicist Enrico Fermi, who, along with 
assorted co i leagues, participated in the first test bomb in the 
desert outside Alamogordo, New Mexico in the early 
morning hours of a summer day in July. 1945 

When the dale had been established for the secret lest, 
staff members from the Manhattan Project (as the secret test 
was known } were invited to bring their spouses to New 
Mexico to watch the results of the several years of research. 
Each staff member had been assigned specific tasks to 
handle while there. Generally, they acted as observers and 
were stationed in a circle around the perimeter of the bomb 
site. Enrico and Laura were stationed in an area about 
twenty miles to the southwest of the bomb site. 

the morning came when the bomb was scheduled to be 
detonated in the test. Laura told if like this... 

Enrico and I woke up at 3:00am, to go to the site. The test 
was scheduled for 4:30am that day, which was July 19, 1945, 
We drove to our post, about twenty miles from the site. It 
had been arranged that the nearly one hundred of us present 
would be Located in a circle a bout 100 milts in circumference 
surrounding the bomb site. We were all to be tn 
communication with each other over, telephones, all of 
which were connected through the exchange in 
Alamogordo. 

We arrived at the site at 4: 15 am and almost immediately 
it began to rain, quite a heavy, very typical torrential 
downpour during the summer. We waited in our car, and at 
4:30 am the time came and went, but the bomb did not go 
off. Enrico and 1 assumed it might have been postponed due 
to the rainstorm, but decided to check with the other staff 
members to see for sure. For some reason, the telephone 
there at the site did not seem to work; the operator would 
not respond, (Note: At that time, nearly all phones in the 
United Slates, and certainly in New Mexico, were manual. 
No dialing of any sort war possible — you had to use the 
operator for everything .) 

Finally Enrico decided that we would drive into town and 
try to contact the others and see what went wrong. So we 
drove back to town, and got there about 5:15 am. The only 
place open at that time of night was a hotel, and we stopped 
in thereto use a pay phone. Strangely enough, the pay phone 
was not working either, or at least the operator never came 
on the line to ask what we wanted. Enrico was quite curious 
about all this and decided to investigate. We went outside 
the hotel, and Enrico found where the telephone wires came 
off the pole and down into the building. He decided that we 


would follow the wires, so we walked down the street 
looking overhead at the wires on the pole as we went along. 
Finally, we turned down one street and saw a house. The 
telephone poles and wires from all directions seemed to 
come down to this house. There must have been hundreds of 
wires from telephone poles all coming down onto the side of 
this house and going in through an opening 

Wc noticed that there was a front porch light which was 
on. The front door was open, but there was a screen door 
which was closed. We went up on the front porch and looked 
into the house, A switchboard was there, and there were a 
dozen or more lights on the switchboard Ik, blinking off and 
on as pcdple were flashing the switch hooks on their phones 
trying to raise the operator. The room was just dimly lit, and 
near the switchboard was a sofa, and a woman was laying on 
the sofa sound asleep] Enrico pounded very loudly on the 
screen door, and shouted at the woman. Suddenly she 
opened her eyes and looked at him, very startled. Then she 
looked at the switchboard. Immediately she sprang up, 
dashed over to the board, sat down and began frantically 
answering the calls.,; 

Without saying any more, Enrico and 1 left, went back to 
the hotel where our car was parked, and drove back to our 
monitoring post twenty miles out into the desert. We had 
been at our post only about five minutes when the explosion 
went off, at about 6:50 am, which was two hours behind 
schedule. Later, we talked to the other staff members and 
found that there had been some confusion because of the 
raim None of them had been able to reach the others because 
the telephone operator had fallen asleep, and the phones 
were not getting answered /connected... 

We on the staff all had a big Laugh out of it, but nothing 
more was ever said or done, and [ doubt to this day that 
that woman is even aware that the first atomic explosion in 
the world was delayed two hours because of her. 

Amazing, but true. Alamogordo was a tiny town back in 
the 4Q r s, and it's very doubtful that the night operator had 
ever seen so much traffic in her life as the hundred or so 
people all on the line at once that early morning. More than 
likely, the poor dear had had a very rough day the day 
before, in the miserable summer heat, had been unable to 
sleep during the day, and had come to work that night 
thoroughly exhausted. She probably decided that "it won't 
hurt just to dose mv eyes for a minute ... " and the rest of the 
story is already told. After alt, experience had taught her 
that in fact she would not usually get a dozen calls all night 
on her shift, and she felt relatively safe in stretching out "just 
for a minute”. 


Do you have a story about computers or phones? Send it to us! If we print it, you’ll get a 
year’s subscription to 2600! The address ; 2600, Box 752, Middle Island, NY 1 1953. 

(continued from page 2) 



their offices, which takes away the task of having to dial the 
MCI access number. In addition, you don't, have to enter an 
authorization code and you don't even have to have touch- 
tones 6 . You simply pick up the phoneand there's your MCE 
dialtone! According to MCE, you have to make at least S75 
worth of out-of-state calls per month for this system to pay 
off. Of course, you cant access operators 1 , directory 
assistance, 800 numbers, and that sort of thing because 
I) MCE doesn't support any of those services and 2) they're 
certainly not going to let you connect to something (hey 
can't charge you for. OF course, if you know what you're 


doing, you can route calls in such A way that numbers that 
aren't supposed to go through for you will work, and Cod 
knows where it finally shows up! This doesn't involve extra 
codes, blasting the line with tones, or anything overly 
suspicious. AIL you need is the right combination of area 
codes. Now this has been proven to work with MCI 
dedicated lines; it's rumoured to work on dial-ups as well,., 
Finally, MCI is starting to offer its own phone booths at 
airports, which we'll report on as soon as wc find one. And 
of course, there's MCI Mail, an electronic overnight mail 
service started up last fall which hackers are currently 
probing. When we get conclusive results on that, we'll pass 
them along. MCI can be reached at 8006246240. 



2600 


page 


The following is a list of hosts that are accessible throu 
ARPANet* ARPANet connects many systems together, allowing them to sc 
electronic mall, transfer files, and be able to work on each other 
computers. The network is very intricate, containing many subnet 
including the one below, called "MILNET" #■ short for "Military Network 
That is, our military. This is a small list, encompassing approximate 
one twentieth the entire number of systems accessible through ARPANe 
Notice the PENTAGON-TAC below. This Is an access point for people in t 
government. 


address: 

Host name : 

Host type: 

Operating 


H H H H H _ a | 

i± *■-" * s s s 

e ^ t; z z ~ ~ ~ ~ ~ 

26.0.0.3 

NOSC-CC 

VAX-11/750 

□NIX 

26 . 2 * 0 * 3 

L0GIC0N 

PDP-11/70 

UNIX 

26-3,0.3 

NPRDC 

VAX-11 / 780 

UNIX 

26.0.0.8 

NRL 

VAX-11/750 

□NIX 

26.1.0.8 

NRL-AIC 

VAX- 11/780 

UNIX 

26.2.0.8 

NSWC-W0 

VAX- 11/ 750 

UNIX 

26.3.0.8 

NRL-T0PS10 

DEC-10 

TOPS 10 

26.6.0,8 

NRL-ARCTAN 

PDP-11/40 

RSX11 

26.7.0.8 

NRL-CSS 

VAX-11/780 

UNIX 

26.1.0.13 

GUNTER-ADAM 

DEC- 2 060 

TOPS 20 

26.3.0.13 

J ATC-KEES1 

BURROUGHS- B/ 29 

BT0X/UNIX 

26, 0.0+14 

CMU-CS-B 

DEC T 1050 

T0PS10 

26.6.0.16 

RIACS- ICARUS 

VAX-11/730 

UNIX 

26.0.0.17 

MITRE 

C/70 

UNIX 

26.0.0.18 

RADC-MULTICS 

H0NEYWELL-DPS-B/70M 

MULTICS 

26.3.0.18 

RADC-TOPS20 

DEC- 204 0T 

TOPS 20 

26.5.0.18 

RADC-UNIX 

PDP-11/45 

UNIX 

26.G.0.1B 

GE-CRD 

VAX-11 /780 

VMS 

26.0.0+19 

NBS-VMS 

VAX- 11/ 780 

VMS 

26.1.0.19 

NBS-SDC 

VAX-11/7B0 

VMS 

26.2.0+19 - 

NBS-UNIX 

VAX- 11/ 750 

UNIX 

26.3.0.19 

NBS-PL 

PDP-11/70 

UNIX 

26+6.0.19 

NBS-AMRF 

VAX-ll/780 

VMS 

26.7.0.19 

NBS-SSI 

VAX-11/750 

UNIX 

26.4.0.20 

DCA-EMS 

C/70 

UNIX 

26.0.0.23 

USC-ECLB 

DEC-1090B 

T0PS20 

26.3+0.2 3 

USC-ECL 

DEC- 109 0B 

TOPS20 

26.0.0.24 

NADC 

VAX-ll/780 

UNIX 

26.1.0.25 

DDN1 

C/70 

UNIX 

26 .0.0. 26 

PENTAGON-TAC 

C/30 

TAG 

26.3.0.26 

TCACCIS-CSC 

VAX-ll/750 

VMS 

26.0,0.29 

BRL 

PDP-11/70 

UNIX 

26.1.0.29 

APG-l 

C/70 

UNIX 

26.3.0.30 

ATC -HANOI 

BURROUGHS -8/ 29 

btos/unix 

26+0.0+33 

NPS 

PLURIBUS 

PLI 

26+3.0,33 

FNOC-SECURE 

PLURIBUS 

PLI 

26.0.0.35 

N0SC-SECURE2 

PLURIBUS 

PLI 

26.1.0.35 

NOSC-TECR 

VAX-ll/780 

VMS / EUNICE 

26.3.0.35 

N0SC-SECURE3 

PLURIBUS 

PLI 

26.4.0.35 

N0SC-F4 

F00NLY-F4 

FO0NEX 

26+0+0+36 

COINS-TAS 

PLURIBUS 

PLI 

26+1.0.36 

HAWAII-EMH 

C/ 70 

UNIX 

26+0.0.39 

EDWARDS-VAX 

VAX-11/7B2 

VMS 

26.1+0+39 

EDWARDS-2060 

DEC-2060T 

TQPS20 

26. 1.0.45 

ARDC 

VAX-ll/780 

UNIX 

26.3+0.46 

0KC-UNIX 

PDP-11/70 

UNIX 

26.1+0+48 

AFWL 

PDP-11/50 

RSXllM 

26.0.0+49 

BBNB 

DEC- 10 

TENEX 



26.0,0.50 

, DARCQM-TEST 

VAX- 11/750 

UNIX 

26.3.0*50 

LS5A-DB1 

NAS3-5 

MVS 

26.7*0.50 

ctl-ai 

VAX-11/780 

VMS 

26.0,0.53 

AFSOAD 

PDP- 11/45 

RSX11M 

26,2.0.53 

AFSODEV 

PDP-11 /44 

RSX11M 

26,4.0*53 

NCSC 

VAX-11/750 

UNIX 

26.5.0.53 

martin 

PDP-11/45 

RSX 

26.6.0.53 

EGLIN-VAX 

VAX-11/ 780 

VMS 

26.2.0.54 

ACC 

PDP-11/ 70 

UNIX 

26*1.0.55 

ANL-MCS 

VAX-11/ 780 

UNIX 

26.2.0.55 

COMP ION -VMS 

VAX-11/750 

VMS 

26.0.0.57 

TYCHO 

PDP-11/ 70 

UNIX 

26 . 2 . 0 * S7 

MARYLAND 

VAX-11 / 780 

UNIX 

26. 0.0. SS 

NYU 

VAX- 11 / 700 

UNIX 

26.1.0.58 

BNL 

PDP-11/44 

UNIX 

26.3.0*60 

CEC0M-1 

F0ONLY-F4 

TENEX 

26.0.0.61 

STL-H05T1 

DEC-2040 

TOF520 

26.1.0.61 

ALMS A- 1 

VAX-11/ 750 

UNIX 

26.1.0.64 

MARTIN -B 

VAX-11/750 

VMS 

26,3.0.64 

ROBINS-UNIX 

PDP-11/45 

UNIX 

26.0.0.65 

AF5C-5D 

DEC-2020T 

TOPS20 

26.2.0.65 

AEROSPACE 

VAX-11/780 

UNIX 

26* 3.0*65 

' MARTIN -ED 

PDP-11/45 

RSXUM 

26.1*0*66 

AFGL 

PDP-11/50 

RSX11M 

26*3*0*66 

MITRE- BEDFORD 

VAX-11/ 780 

UNIX 

26.0,0*67 

AFSC-HQ 

DEC-2040T 

TOPS20 

26.1-0.73 

SRI-HARF 

PLURIBUS 

PLI 

26.4.0.73 

SRI-F4 

F00NLY-F4 

TENEX 

26.0.0.74 

SIMTEL20 

DEC-20 4 0T 

TOPS 20 

26.1.0.74 

HSMR70A 

C/70 

UNIX 

26.3.0.74 

WSMR70B 

C/70 

UNIX 

26.3.0.78 

MCCLELLAN 

PDP-11/ 70 

UNIX 

26.0*0.81 

NEMS 

VAX-11/750 

UNIX 

26.1.0.81 

NALCON 

VAX-11/750 

UNIX 

26*3.0*81 

DTRC 

VAX-11/780 

UNIX 

26. 0. 0.82 

BBNCCT 

C/70 

UNIX 

26.3.0*82 

DDN2 

C/70 

UNIX 

26.4.0. 82 

BBN-RSM 

PLURIBUS 

PLI 

26.9*0*82 

TEPI 

C/30 


26.0.0.87 

SANDIA 

DEC-2O60T 

TOPS 20 

26 .0*0* SS 

NLM-MCS 

VAX-11/780 

UNIX 

26.0.0.90 

LANL 

VAX-11/750 

UNIX 

26.4,0+92 

NAVDAF- NEWPORT 

UNI VAC- 1100 

CMS 

26.1,0+95 

Sl-A 

FODNLY-F2 

WAITS 

26*2,0,95 

Sl-B 

VAX-11/750 

UNIX 

26.3.0.95 

Sl-C 

VAX-11/750 

UNIX 

26.2.0.97 

FAXRV-NES 

VAX-11/730 

VMS 

26,1.0.103 

USC-ISIE 

DEC-1090T 

T0PS20 

26.2*0.103 

ADA- VAX 

VAX-1 1/ 780 

VMS 

26.3.0.103 

use- IS I 

DEC- 1090T 

TOPS20 

26.1.0.104 

DC EC-LSUS2 

IBM-15& 

MVS/SP 

26,4.0.104 

DCEC-LSUS 

IBM-158 

MVS /SF 

26.3.0.106 

ARPA-PNG11 

PDP-11/34 

EPOS 

26.0.0.112 

STL-HOST2 

BBN-C/60 

UNIX 

26.0*0.117 

KOREA- EMH 

C/70 

UNIX 


6